EDITORIAL: A how-to for car hackers
16AUTP10_05
10/01/2016
- Content
-
The new vehicle you've just spent 40 months engineering, testing and validating, that's soon to be in customer hands, is now a big, fat target. The hackers want in.
How robust was your threat modeling during development? Where among the vehicle's many potential entry points-the high-risk “attack surfaces” including Bluetooth, Wi-Fi, USB, the OBDII port, tire pressure monitoring system, infotainment, CAN bus, sensors and even an electric car's charging connections-could malicious external data sneak past your built-in defenses to wreak havoc?
- Pages
- 2
- Citation
- Brooke, L., "EDITORIAL: A how-to for car hackers," Mobility Engineering, October 1, 2016.